In an essay to be published on June 17, 2016 in Science magazine Susan Landau, professor of cybersecurity policy at Worcester Polytechnic Institute (WPI), argues that the FBI's recent and widely publicized efforts to compel ...
People must be a consideration when building dams, according to FIU researchers.
New research from the University of Adelaide has highlighted the positive role of shared community gardens in city and suburban areas, helping residents to build community resilience and develop stronger social groups.
The pacific island of Papua New Guinea is one of the world's most resource rich countries, hosting nearly 7 percent of global biodiversity and important reserves of gold, copper and hydrocarbons. However, despite a burgeoning ...
Three Virginia Tech computer scientists are unveiling a novel approach to discovering stealth attacks on computers at the annual ACM Conference on Computer and Communications Security.
Saudi Arabia's newest communications satellite, the Lockheed Martin-built Hellas-Sat-4/SaudiGeoSat-1, will not only be one of the most powerful ever built, it will be among the most agile thanks to new flexible payload technology.
Access to affordable and nutritious food is an ongoing problem in remote Indigenous communities. These areas have an artificially inflated cost of living due to cycles of mining boom and bust, and suffer from a general unavailability ...
The US House of Representatives voted Wednesday to end the NSA's dragnet collection of telephone data from millions of Americans, a controversial program revealed in 2013 by former security contractor Edward Snowden.
The Central Intelligence Agency has been working for years to break encryption on Apple devices, to spy on communications of iPhone and iPad users, a report said Tuesday.
More than 25 billion cyberattacks on the Japanese government and other bodies were logged in 2014, an agency said Tuesday, with 40 percent of them traced to China.